0% found this document useful (0 votes)
14 views9 pages

Federated Learning IoT Presentation

The document discusses a privacy-preserving algorithm for Federated Learning (FL) in IoT environments, addressing security threats such as data poisoning and model interception. It presents an experimental setup demonstrating the algorithm's robustness and competitive accuracy compared to standard FL methods. Future work aims to optimize the algorithm for edge devices and real-world applications.

Uploaded by

Rahul Dash
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views9 pages

Federated Learning IoT Presentation

The document discusses a privacy-preserving algorithm for Federated Learning (FL) in IoT environments, addressing security threats such as data poisoning and model interception. It presents an experimental setup demonstrating the algorithm's robustness and competitive accuracy compared to standard FL methods. Future work aims to optimize the algorithm for edge devices and real-world applications.

Uploaded by

Rahul Dash
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 9

Federated Learning Security and

Privacy-Preserving Algorithm
• Research and Experiments under IoT Critical
Infrastructure
• Presented by: Your Name
• Affiliation: Your Organization
• Date: Presentation Date
Introduction
• Federated Learning (FL) is a decentralized ML
approach.
• IoT generates sensitive distributed data.
• FL in IoT faces privacy and security threats.
• Goal: Secure and privacy-preserving FL
algorithm.
Motivation
• Centralized ML poses privacy risks.
• IoT needs low-latency and secure learning.
• FL is vulnerable to poisoning, inversion, and
free-riding attacks.
Federated Learning in IoT
• Data stays on devices, preserving privacy.
• Reduced communication overhead.
• Applicable to smart cities, healthcare, and
industrial systems.
Challenges in FL for IoT
• Malicious participants can poison data.
• Model updates can be intercepted.
• IoT devices have limited power and
bandwidth.
Proposed Privacy-Preserving
Algorithm
• Improved differential privacy mechanism.
• Secure Multi-Party Computation (SMPC).
• Gradient clipping and noise injection.
• Architecture: local training → secure
aggregation → global update.
Experimental Setup & Results
• FL simulated with IoT nodes.
• Datasets: MNIST, CIFAR-10.
• Metrics: accuracy, leakage, overhead.
• Findings: strong robustness, competitive
accuracy.
Comparison & Analysis
• Compared to standard FL and FL with DP.
• Proposed method shows better accuracy-
privacy balance.
• Higher resilience to poisoning.
• Limitation: Extra computational cost.
Conclusion & Future Work
• Ensures secure, privacy-aware FL for IoT.
• Experiments validate effectiveness.
• Future: optimize for edge devices, real-world
deployment, hardware-level solutions.

You might also like